Pillaging

By definition, pillaging is gathering all possible information from the systems. Knowing where the data is located, for example, could help predict the pivoting techniques. To perform an effective penetration testing, you need to gather all, and not limited to, the following information, installed software and services:

  • Printers shares and security services
  • Database servers
  • Directory servers
  • Certificate authority services
  • Code management servers
  • Virtualization services                                                                                         
The exploitation of most of these services will be discussed in detail later in the following chapters.

Get Advanced Infrastructure Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.